Question No: 11 HOTSPOT

You have computers that run Windows 8 Pro and are configured as a workgroup. Each computer is scheduled to run a Windows Defender full scan every morning at 07:00.

Users report that they are unable to view previous instances of detected malware when they arrive to work.

You need to ensure that all users can see previous instances of detected malware in Windows Defender.

Which option on the Settings tab should you select? (To answer, select the appropriate option in the answer area.)

Answer:

Explanation:

The MAP Toolkit is used for multi-product assessment and planning. It assesses a network environment using agentless data collection technologies to gather inventory and performance information. Then provides assessment reports to aid organizations with their IT infrastructure planning.

Real-Time Protection (RTP) is a feature of Windows Defender, running in the context of the logged-on user, that monitors the registry and file system on the computer by using agents that monitor auto-start extensibility points (ASEP).

Question No: 12 DRAG DROP

You administer computers that run windows 7 and Windows 8. You run an application that saves files that contain local settings unique to each user.

You want to allow users to synchronize settings for an application to any enterprise computer when they log on to the enterprise computer.

You need to implement a solution that will move a user#39;s settings files to any computer. You also need to ensure that you can roll back the changes if necessary.

Which required task or tasks should you perform with each approach? (To answer, drag the appropriate required task to the corresponding approach. Each required task may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.)

The User Experience Virtualization settings template catalog is a folder path on UE-V computers or a Server Message Block (SMB) network share that stores all the custom settings location templates. The UE-V agent retrieves new or updated templates from this location. The UE-V agent checks this location once each day and updates its synchronization behavior based on the templates in this folder. Templates that were added or updated in this folder since the last time that the folder was checked are registered by the UE-V agent. The UE-V agent deregisters templates that are removed from this folder. By default, templates are registered and unregistered one time per day at 3:30 A.M. local time by the task scheduler.

The Microsoft Desktop Optimization Pack (MDOP) is a suite of technologies available as a subscription for Software Assurance customers. MDOP virtualization technologies help personalize the user experience, simplify application deployment, and improve application compatibility with the Windows operating system (UE-V/App-V/MED-V). Additionally, MDOP helps manage, monitor, and deploy key Windows features (MBAM/AGPM). Using MDOP shifts desktop repair from reactive to proactive, saving time and removing challenges associated with troubleshooting and repairing system failures (DaRT).

Question No: 13

A company has 100 client computers that run various editions of Windows 7. The company plans to upgrade or replace computers so that all client computers run an edition of Windows 8.1.

The company plans to use the following programs and features on the Windows 8 computers:

->32-bit and 64-bit software

->Desktop apps

->Windows Media Player

->Storage Spaces

You need to identify the installation or upgrade paths that support the programs and features.

By now, you are familiar with Windows Store apps. There are some pretty cool ones

available in the store, and publishers are adding more every week. A great thing about Windows Store apps is they are super simple to install (and uninstall). But what about line of business (LOB) apps? You probably do not want to publish them through the Windows Store since that would make them publically available. Instead, you can sideload LOB apps. Sideloading simply means installing a Windows Store app without publishing it in and downloading it from the store. You install it directly.

Verify the Requirements

There are a small number of requirements computers must meet to sideload Windows Store apps on them. We will start with computers running Windows 8 Enterprise:

The computer running Windows 8 Enterprise must be joined to the domain. You must enable the “Allow all trusted apps to install” Group Policy setting.

The app must be signed by a \ certificate that is chained to a trusted root certificate.

Question No: 17

Users discover that they must change their Active Directory password more frequently than their Office 365 password.

You need to ensure that the password policies for Office 365 and for Active Directory are the same.

What should you do?

From the Office 365 portal, under Subscriptions, click Manage.

From the Windows Azure Active Directory Module for Windows PowerShell, run Set- MsolUserPassword.

From the Office 365 portal, under Management, click Users.

From the Office 365 portal, under Management, click Domains.

Answer: C

Explanation: In the Office 365 portal, click Admin gt; Users (under Management in the navigation pane). On the Users page, select a user, and then click Edit.

Note:

Some of the options can be managed by using the Office365 Web interface and some task only by using PowerShell.

Office 365 users Password management verses the “Standard” Domain Active directory is a little bit restricted. For example: configure password policy parameters such as – Enforce password history, Minimum password length, Password must meet complexity requirements cannot be configured by the office 365 administrator. At the current time, the options that related to Office 365 users Password management are: reset the user password and setting the number of maximum number of days or password expiration (the default is 90 days).

Question No: 18

You are a systems administrator for your company. The company has employees who work remotely by using a virtual private network (VPN) connection from their computers, which run Windows 8 Pro. These employees use an application to access the company intranet database servers. The company recently decided to distribute the latest version of the application through using a public cloud.

Some users report that every time they try to download the application by using Internet Explorer, they receive a warning message that indicates the application could harm their computer.

You need to recommend a solution that prevents this warning message from appearing, without compromising the security protection of the computers.

What should you do?

Publish the application through a public file transfer protocol (FTP) site.

Publish the application through an intranet web site.

Instruct employees to disable the SmartScreen Filter from within the Internet Explorer settings.

Publish the application to Windows Store.

Answer: B

Explanation: Intranet is the generic term for a collection of private computer networks within an organization. An intranet uses network technologies as a tool to facilitate communication between people or work groups to improve the data sharing capability and overall knowledge base of an organization#39;s employees.

Intranets utilize standard network hardware and software technologies like Ethernet, Wi-Fi, TCP/IP, Web browsers and Web servers. An organization#39;s intranet typically includes Internet access but is firewalled so that its computers cannot be reached directly from the outside.